SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWith the cost of eye-scanning technology coming down and the need for more secure systems going up, it's time to take a close look at iris recognition for security applications. Due to research and patented technology, iris recognition has emerged from its early image of spy film fantasy to reality. This paper explores the origins of iris recognition, how it works, how it stacks up against other forms of biometric identification and what is required to perform the identification. Comparisons will be made to fingerprinting, retinal scanning, speaker recognition, facial scanning and hand geometry. We will report on products that are on the market today to help implement iris recognition technology and will examine some existing and proposed real-world applications that take advantage of iris recognition for secure biometric identification and authentication. The information and conclusions drawn in this paper should help others who are investigating the usefulness of iris recognition for secure biometric identification.